The network and environment pillar works in concert with the other Zero Trust pillars as part of a holistic Zero Trust security model that assumes adversary breaches occur inside the network, and so limits, verifies, and monitors activities throughout the network.
The concepts introduced in this cybersecurity information sheet provide guidance on enhancing existing network security controls to limit the potential impact of a compromise through data flow mapping, macro and micro segmentation, and software defined networking.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | National Security Agency (NSA) |
Published: | March 5, 2024 |
License: | Public Domain |